Your home may be your castle, but on social networks, your friends are your perimeter. Will they enclose and protect your personal...
Seventeen mysterious cellphone towers have been found in America which can only be identified by a heavily customized handset built for Android...
So you have contacts all around the world, or you are in a job that needs you to talk to people in...
The FBI has issued a warning to police and other emergency response personnel about a lethal new tool which 'malicious actors' have...
A data breach of staggering proportions has hit South Korea - involving 27 million people and 220 million private records - all...
Concern is growing over the export of surveillance equipment which can track the movements of anyone carrying a cellphone. Such technnologies are...
Users witness looking at pictures of Russian car crash regardless of what they searched on Google Images. If someone searched for ‘cat’ the search result...
More than a thousand U.S. businesses have been affected by point-of-sale malware - malicious software written specifically for online fraud, to steal...
An image of a Russian car crash has piled up in Google Images - leading to speculation that the service has been...
2014 Emmy Awards were pretty much unsurprising and a lot of fan favorites won. NBC drama Breaking Bad won the Emmy Award for...
Sony’s PlayStation Network was back online and the information of its 53 million users safe, despite a weekend-long cyber attack, and a...
A new tactic where waves of Bitcoin wallet phishing emails are targeted at corporations has proved a success for the criminals behind...
There would have been many times when you wanted to download just the audio of a YouTube video, but not finding any...
Young people are targeted for data theft at 35 times the rate of adults – they are considered an easy target for...
This week saw two of the scariest targets for hacks ever - nuclear plants and city-wide traffic systems. Tthe traffic-light hack could...
But some things on Facebook haven’t changed - namely, the scams. It’s not that cybercriminals are unoriginal - it’s just that there...
Security researchers from University of Michigan and the University of California Riverside Bourns College of Engineering have found out a security flaw...
If you ever get asked to fix the PC of a friend or colleague which has been having problems, the first thing...
‘Scareware’ - fake antivirus programs which attempt to fool the user into downloading malware, by warning him or her of a “threat”...
Classified documents relating to the missing Malaysian Airlines Flight MH370 were stolen using a carefully-crafted spear-phishing attack, targeting 30 government officials just...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor